cleanup of chungus files

This commit is contained in:
Ingolf Wagner 2024-05-19 00:20:54 +02:00
parent e825dfd9d1
commit ab4a870d0f
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
17 changed files with 12 additions and 79 deletions

View file

@ -152,7 +152,6 @@
legacy_2305 = nixpkgs-legacy_2105 { inherit system; }; legacy_2305 = nixpkgs-legacy_2105 { inherit system; };
polygon-art = polygon-art.packages.${system}; polygon-art = polygon-art.packages.${system};
landingpage = landingpage.packages.${system}.plain; landingpage = landingpage.packages.${system}.plain;
trilium-server = nixpkgs-unstable.legacyPackages.${system}.trilium-server;
kmonad = kmonad.packages.${system}.kmonad; kmonad = kmonad.packages.${system}.kmonad;
tasksh = taskshell.packages.${system}.tasksh; tasksh = taskshell.packages.${system}.tasksh;
overviewer = overviewer.packages.${system}.overviewer; overviewer = overviewer.packages.${system}.overviewer;

View file

@ -63,7 +63,7 @@ in
${pkgs.khal}/bin/ikhal ${pkgs.khal}/bin/ikhal
'') '')
# todo : before deleting this, put it in trilium # todo : before deleting this, put it in logseq
(python3Packages.bugwarrior.overrideAttrs (old: { (python3Packages.bugwarrior.overrideAttrs (old: {
version = "develop"; version = "develop";
src = pkgs.fetchFromGitHub { src = pkgs.fetchFromGitHub {

View file

@ -50,11 +50,8 @@ let
"minio.chungus" = hosts.chungus; "minio.chungus" = hosts.chungus;
"sync.chungus" = hosts.chungus; "sync.chungus" = hosts.chungus;
"tdarr.chungus" = hosts.chungus; "tdarr.chungus" = hosts.chungus;
"trilium.chungus" = hosts.chungus;
"tts.chungus" = hosts.chungus; "tts.chungus" = hosts.chungus;
"paperless.chungus" = hosts.chungus; "paperless.chungus" = hosts.chungus;
# cream
"trilium.cream" = hosts.cream;
}; };
network = "private"; network = "private";
in in

View file

@ -40,8 +40,6 @@ with lib;
bitwarden bitwarden
rbw rbw
unstable.trilium-desktop # old (use logseq now)
nginx-config-formatter nginx-config-formatter
unstable.yt-dlp unstable.yt-dlp

View file

@ -1,14 +0,0 @@
{ ... }:
{
# port 5000 already in use.
services.nix-serve = {
enable = false;
# needed if i want to trust my own build packages and dirivations
# nix-store --generate-binary-cache-key key-name secret-key-file public-key-file
# secretKeyFile = sops.nixServeSecretKeyFile.path
};
}

View file

@ -12,58 +12,40 @@
./packages.nix ./packages.nix
./network-wireguard.nix
./network-tinc.nix
./network-tinc-retiolum.nix # make sure no service is open for this vpn! ./network-tinc-retiolum.nix # make sure no service is open for this vpn!
./network-tinc.nix
./network-wireguard.nix
./hass.nix
./hass-zigbee2mqtt.nix
./hass-mqtt.nix ./hass-mqtt.nix
#./hass-wifi.nix ./hass-zigbee2mqtt.nix
./hass.nix
#./mail-fetcher.nix
#./borg.nix
./taskwarrior-autotag.nix ./taskwarrior-autotag.nix
./media-share.nix
./media-audiobookshelf.nix ./media-audiobookshelf.nix
./media-jellyfin.nix
./media-youtube.nix
./media-castget.nix ./media-castget.nix
./media-curl.nix ./media-curl.nix
./media-jellyfin.nix
./media-share.nix
./media-syncthing.nix ./media-syncthing.nix
./media-youtube.nix
# logging ./telemetry/grafana.nix
./grafana.nix
./telemetry/telegraf-smart.nix ./telemetry/telegraf-smart.nix
./telemetry/telegraf.nix ./telemetry/telegraf.nix
#./telemetry/opentelemetry-hass.nix #./telemetry/opentelemetry-hass.nix
./telemetry/prometheus.nix ./telemetry/prometheus.nix
./telemetry/loki.nix ./telemetry/loki.nix
#./home-display.nix
./sync-rbackup.nix ./sync-rbackup.nix
./sync-torrent.nix
./sync-script.nix ./sync-script.nix
./sync-syncoid.nix ./sync-syncoid.nix
./service-atuin.nix
./service-paperless.nix
./services-forgejo.nix
./services-s3.nix ./services-s3.nix
./services-vault.nix ./services-vault.nix
./services-forgejo.nix
#./kiosk.nix
./trilium.nix
./atuin.nix
./cache.nix
./docker-registry.nix
./paperless.nix
]; ];

View file

@ -1,3 +0,0 @@
{
services.dockerRegistry.enable = true;
}

View file

@ -9,11 +9,6 @@
./packages.nix ./packages.nix
./syncthing.nix ./syncthing.nix
./tinc.nix ./tinc.nix
# ./trilium.nix
#./wifi-access-point.nix
#./wireshark.nix
#./qemu.nix
./wireguard.nix ./wireguard.nix
]; ];

View file

@ -87,8 +87,6 @@ in
bitwarden bitwarden
unstable.trilium-desktop
]; ];
home-manager.users.mainUser = { home-manager.users.mainUser = {

View file

@ -1,19 +0,0 @@
{ config, pkgs, ... }:
{
services.trilium-server = {
enable = true;
instanceName = config.networking.hostName;
host = "10.23.42.27";
nginx = {
enable = true;
hostName = "trilium.${config.networking.hostName}.private";
};
};
services.nginx.virtualHosts."${config.services.trilium-server.nginx.hostName}".extraConfig = ''
allow ${config.tinc.private.subnet};
deny all;
'';
}